AUTHOR ARCHIVES

Adam Clark Estes

March 4, 2013
FROM NEXTGOV
Medical researchers dropped their microscopes on Sunday when a team of doctors from Mississippi revealed that an infant in their care was born with HIV and cured two years later. Dr. Hannah Gay, who treated the baby, dropped the mic. (Not literally.) Within minutes of the announcement, some were calling...

March 1, 2013
FROM NEXTGOV
Nobody's calling it a bribe, but Google donated $25,000 to honor the Federal Trade Commission chairman while the agency was embroiled in an investigation into the company's alleged anti-competitive practices. Last year, Google, along with companies like AOL and Comcast, gave the money to Common Sense Media for an award...

February 28, 2013
Everybody assumed that the Senate would confirm hard-working, navel-gazing Jack Lew as treasury secretary. And they just did. The real question is: Does Lew know what he's getting into? The first of three budget deadlines kicks in on Friday, and Lew has to take the lead on fixing the United...

February 27, 2013
Now that Chuck Hagel's confirmation has gone off without a hitch (for the most part), it's John Brennan's turn to take the spotlight, and it look like those drone memos will be a real roadblock. We could've guessed as much a couple of weeks ago when a Justice Department "white...

February 26, 2013
After failing to win all but one* of its Oscar nominations, Zero Dark Thirty's filmmakers got some good news on Monday, when the Senate Intelligence Committee dropped its investigation into the movie. It's been six weeks since a panel of senators lead by Diane Feinstein and John McCain opened the...

February 26, 2013
FROM NEXTGOV
When three Connecticut lawmakers asked Mark Zuckerberg in a letter on Monday to do something about the flood of fake Sandy Hook memorial pages, he got back to them quickly. Democratic Senators Richard Blumenthal and Chris Murphy and Rep. Elizabeth Esty, also a Democrat, pointed out that Facebook is filled...

February 25, 2013
FROM NEXTGOV
The New York Times is the latest media outlet to liken the quiet standoff between the United States and China over cyber security to "a new Cold War." In a Sunday evening piece of news analysis, the paper's David E. Sanger wrote about "how different the worsening cyber-cold war between...

February 25, 2013
Afghanistan's National Security Council ordered all NATO and American troops out of the Wardak province on Sunday, following allegations that American Special Operations forces tortured and murdered locals. President Hamid Karzai explained at a meeting of the council on Sunday, "It became clear that armed individuals named as U.S. special...

February 21, 2013
FROM NEXTGOV
New satellite images of the nuclear test site in North Korea shows an uptick in activity for the first time since the country's third nuclear test on February 12, stirring fears that a fourth test is imminent. The US-Korea Institute at Johns Hopkins University spotted the renewed activity on February...

February 21, 2013
FROM NEXTGOV
Faced with sluggish Chromebook sales and challenged by surprisingly innovative Windows machines, Google will reportedly release a touchscreen laptop later this year. A Wall Street Journalscoop says that the search giant will double down on its commitment to manufacturing hardware with a touchscreen laptop powered by the Chrome operating system....

Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.